Encry
ption
One way
of hiding, but we can do better.
Metallic
Element : Hg
Encryption
, as
distinct from wiping,
encodes text, data, or images, yet keeps the material intact, allowing you to
decrypt (ie.
decode) when you need to access it.
You can encrypt files, folders,
partitions, or even whole discs.
There
are numerous approaches to this
: the PGP system,
requires public and
private digital keys, and is a very powerful
implementation of the
idea. It has an option for encrypting whole discs or partitions at a time
(5th button under the Table).
Some of the applications
in the Table can be configured to appear
on the
RClick Menu of any File or Folder, Drive or
Shortcut. Some will hide the files as well as encrypting them. It is also possible to send encrypted (secure) email
messages, and there are web-based applications to do this that require no downloads.
You do, however, need to create an account and log in.
An
application with built-in encryption is Power Desk
5
If an encrypted file is opened in a text editor, such as
Notepad
, it appears to contain garbage *. Its hidden data is unobtainable without the password. If the actual
name is also sensitive you may need to change it manually, either before
or after encryption. If you change it afterwards, when unencrypted, the original
name (and extenders) will re-appear.
* Do not attempt to add,
change or remove characters inside encrypted files. You will corrupt the data stream and you
won't be able to decrypt them.

Table 8
Encryption Packages
|
Program
/ Version
|
Function
|
URL
|
Notes
|
Cryptext 3.40 |
Cryptext
is a public domain Windows shell extension that performs strong file
encryption and runs on Windows 95 or later and NT4 or later. It uses
a combination of SHA-1 and RC4 to encrypt files using a 160-bit key, and
generates a salt value for each file to ensure that no two files are
encrypted with the same keystream.
|

|
Its functions
are performed from a RClick Menu option.
|
ABI
Coder 3.6.1 |
ABI- CODER is a personal
file encrypter that is powerful and easy to use. It allows you to encrypt
multiple files in multiple folders by using one of its 3 encryption algorithms.
This software also has a self-decrypting file tool, which can create encrypted
files, which do not require any decryption software.
|
|
Unlimited period trialware
|
EasyCrypto
Deluxe 5.5 |
Can
encrypt both standalone files and entire folders. Uses 128-bit key BlowFish
algorithm. You can build self-extracting encrypted and compressed archives and
send them to others. The only thing a recipient needs to extract the encrypted
files is the correct password. You can also add several files
or entire folders to an encrypted EasyCrypto ZIP file. When you send this
type of archive to someone, the recipient just needs to install EasyCrypto to
extract the folders.
|
|
After encrypting
files, EasyCrypto securely and automatically wipes the originals.
|
KPKFile 7.1 |
This
is a program that provides security for your sensitive files by encrypting
and hiding them. It also offers the option of burying the encrypted files
within another, such as a Microsoft Word document or a bitmap image.
Moreover, KPKFile can create a secret folder (named Private Folder) that's
impossible to access without the proper password. It manages an encrypted
database of passwords and related data.
|

|
Can
hide encrypted files as stand-alone or inside others. Consult the
Read Me file for a fuller description of KPK's main functions.
|
Scram
Disk 3.01 |
Scramdisk is a program that allows the creation and use of virtual encrypted drives. Basically, you create a container file on an existing hard drive which is created with a specific password. This container can then be mounted by the Scramdisk software which creates a new drive letter to represent the drive. The virtual drive can then only be accessed with the correct
passphrase.
Once the passphrase has been entered correctly and the drive is mounted the new virtual drive can then be used as a normal drive, files can be saved and retrieved to the drive and you can even install applications
on it.
|

|
Not for
Windows XP
ScramDisk
virtual disks can be stored in :
a. a container file on a FAT hard disk.
b.
in an empty partition.
c.
in the low bits of a WAV audio file (ie. steganography).
|
Hush
Mail |
HHush
Mail is a free Web-based E-mail service, that offers 1024-bit technology
encryption for your messages and attachments. ush
Mail is a free Web-based E-mail service, that offers 1024-bit technology
encryption for your messages and attachments.
|
 |
Note
: to take advantage of the 1024-bit encryption feature your
recipient must also be a HushMail user.
|
Stealth
Message |
Stealth Message gives you email privacy with self-destruct options through your existing address. You choose the level of security, putting control in your hands.
There's no software to download and you can access Stealth Message from anywhere,
and at anytime through browser.
|
 |
Email Privacy with
no downloads. |
Crypto Anywhere
2.0 |
Crypto Anywhere is
secure and portable email client. It allows you to
send secure email messages from anywhere. The program offers the
choice of self-decrypting messages (receiver only needs the password) or
public key encryption (receiver needs decryption software). |
 |
Small
enough to fit on a single floppy. Support for attachments is included,
and there is a secure friends list (stored keys). No software to
install.
|
SneakeMail
2.0 |
The original disposable email service, created for email users to regain power over their email from commercial forces and catch them spamming.
|
 |
Premium
(pay) service upgrade route.
No ads or
commercial ties.
|
Give
'em a Good Hiding... |





Click the
buttons to follow links to other software and a comprehensive account of file
encryption.